Misbehaviors in SACK Generation

Size: px
Start display at page:

Download "Misbehaviors in SACK Generation"

Transcription

1 Misbehaviors in SACK Generation Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer Computer and Information Sciences Department University of Delaware Newark, Delaware {nekiz, abu, Abstract While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed four misbehaviors in the generation of SACKs. These misbehaviors could result in the data sender mistakenly thinking data reneging occurred. Further testing detected two additional SACK generation misbehaviors which in the worst case could result in a data sender receiving a SACK for data that was never received. This paper reports the results of testing a wide range of operating systems using TBIT to document which ones misbehave in each of the six ways. One can conclude that the handling of SACKs while simple in concept is complex to implement. Keywords- SACK; Selective Acknowledgement; TCP; TBIT I. INTRODUCTION The Selective Acknowledgment (SACK) mechanism, RFC 2018 [1], an extension to Transmission Control Protocol s (TCP) [2] ACK mechanism, allows a data receiver to explicitly acknowledge arrived out-of-order data to the data sender. When using SACKs, a TCP data sender need not retransmit SACKed data during the loss recovery period. Previous research [3, 4, 5] showed that SACK improves TCP throughput when there are multiple losses within the same window. The success of a SACK-based loss recovery algorithm [6] is proportional to the SACK information received from the data receiver. In this paper, we investigate RFC 2018 conformant SACK generation. Deployment of the SACK option in TCP s is an increasing trend. In 2001, 41% of the web servers tested were SACK-enabled [7]. In 2005, SACK-enabled web servers increased to 68% [8]. All of the operating systems tested in this study open SACK-enabled TCP s by default. Today s reliable transport protocols such as TCP and Stream Control Transmission Protocol (SCTP) [9] are designed to tolerate data receiver reneging (simply, data reneging) (Section 8 RFC 2018). Data reneging occurs when a data receiver SACKs data, and later discards that data from its receiver buffer prior to delivering it to the receiving application (or receiving socket buffer). In related research, we argue that reliable transport protocols should not be designed to tolerate data reneging, largely because we believe data reneging does not occur (or rarely occurs) in practice [10]. While conducting a study to investigate this belief, we analyzed TCP SACK information within Internet traces provided by the Cooperative Association for Internet Data Analysis (CAIDA) [11]. At first it seemed that data reneging was happening frequently. On closer inspection however, it turned out that the generation of SACKs in many TCP s was incorrect according to RFC Sometimes SACK information that should have been sent was not. Sometimes the wrong SACK information was sent. These misbehaviors wrongly gave the impression that data reneging was occurring. This observation led us to verifying SACK generation behavior of TCP data receivers for a wide range of operating systems. In this paper, our goal is to develop a methodology for verifying SACK behavior, and apply the methodology to report misbehaving TCP stacks. We first present in Section II four misbehaviors observed in the Internet traces. These misbehaviors can reduce the effectiveness of SACKs. To discover which implementations are misbehaving, we defined four test extensions to the TCP Behavior Inference Tool (TBIT) [12], a tool that detects TCP endpoint behaviors. The experimental setup using TBIT is described in Section III, and we present the results of the tests in Section IV. Section V introduces two additional SACK related misbehaviors observed during our TBIT testing. These misbehaviors are more serious. In the worst case, one misbehavior results in a data sender receiving a SACK for data that was never received, thus questioning the data transfer reliability of the. Finally Section VI identifies several methodologies used to infer TCP behavior, and Section VII concludes our work. II. TESTING SACK BEHAVIOR We present four TBIT tests designed to reproduce the four misbehaviors of TCP SACK generation observed during our data reneging investigation. We describe the observed SACK misbehaviors and present the corresponding TBIT tests in detail. The four observed SACK generation misbehaviors described as:

2 1. Fewer than maximum number of reported SACK blocks 2. Receiving data between Cum ACK and first SACK block 3. Receiving data between two previously reported SACK blocks 4. Failure to report SACKs during bidirectional data flow A. Fewer than maximum number of reported SACK blocks Misbehavior 1: RFC 2018 Section 3 specifies that the data receiver SHOULD include as many distinct SACK blocks possible in the SACK option, and that the 40 bytes available for TCP options can specify a maximum of four SACK blocks. For some TCP flows, we observed that at most two or sometimes three SACK blocks were reported by a data receiver even when additional space existed in the TCP header to append additional SACK blocks. SACK blocks at the data receiver are known to be more than two (say A l -A r, B l -B r, and C l -C r ) but only two SACK blocks are reported (A l -A r and B l -B r ). When the cumulative ACK advances beyond A r, SACK block A l -A r, is correctly no longer reported, and SACK block C l -C r is reported along with block B l -B r. This misbehavior implies that the data receiver reports at most two SACK blocks. Our first TBIT test, A, checks misbehavior 1. We extended existing TBIT test SackRcvr [12] to determine the maximum number of reported SACK blocks. The modified test operates with minimum number of TCP segments. For first three tests explained in this section, each TCP data segment generated by TBIT carries 1 byte of data for simplicity. The sequence number of data is given in parenthesis. The TBIT test, depicted in the Fig. 1, operates as follows: Test A 1. TBIT establishes a to the TCP Implementation Under Test (IUT) with SACK-Permitted option and Initial Sequence Number (ISN) TBIT skips sending 2 nd data packet (402) to create a gap at the TCP IUT, and sends 3 rd data packet (403) 7. TBIT skips sending 4 th data packet (404) to create a second gap at the TCP IUT, and sends 5 th data packet (405) 9. TBIT skips sending 6 th data packet (406) to create a third gap at the TCP IUT, and sends 7 th data packet (407) 10. TCP IUT acknowledges out-of-order data with SACK 11. TBIT skips sending 8 th data packet (408) to create a fourth gap at the TCP IUT, and sends 9 th data packet (409) 12. TCP IUT acknowledges out-of-order data with SACK 13. TBIT send three reset (RST) segments to abort the The last SACK from the TCP IUT reflects an implementation s support for maximum number of SACK blocks reported. Figure 1. Fewer than maximum number of reported SACK blocks A conformant SACK implementation s last SACK should be as the last SACK, highlighted in the rectangle, of Fig. 1. A misbehaving SACK implementation would lack either block B (Misbehavior 1a) or both blocks A and B (Misbehavior 1b). B. Receiving data between Cum ACK and first SACK block Misbehavior 2: RFC 2018 specifies that: If sent at all, SACK options SHOULD be included in all ACKs which do not ACK the highest sequence number in the data receiver's queue. So, a SACK block should be included when the cumulative ACK is increased and there is still out-of-order data in the receive buffer. For some TCP flows having at least two SACK blocks, we observed the following behavior. Once the data between the cumulative ACK and the first SACK block was received, the data receiver increased the cumulative ACK, but misbehaved and did not acknowledge any SACK blocks. (The acknowledgement with no SACK blocks implies an instance of data reneging.) Test B, described below and pictured in Fig. 2, checks this possible misbehavior. The second SACK block should remain present when the cumulative ACK is increased beyond the first SACK block but is less than the second SACK block. Test B 5. TBIT skips sending 2 nd and 3 rd data packets (402 and 403) to create a gap at the TCP IUT (the gap between Cum ACK and first SACK block), and sends 4 th data packet (404) 7. TBIT skips sending 5 th data packet (405) to create a second gap at the TCP IUT, and sends 6 th data packet (406) 9. TBIT sends 3 rd data packet (403) 10. TCP IUT acknowledges out-of-order data with SACK 11. TBIT sends 2 nd data packet (402) to fill the gap between Cum ACK and first SACK 12. TCP IUT acknowledges in order data with SACK

3 13. TBIT sends three reset (RST) segments to abort the Figure 3. Receiving data between two previously reported SACK blocks Figure 2. Receiving data between Cum ACK and first SACK block A conformant SACK implementation should report SACK block ( ) as shown in the last SACK in Fig. 2. A misbehaving SACK implementation would omit reporting the SACK block which could be interpreted as data reneging since the previously SACKed data are not reported anymore. C. Receiving data between two previously reported SACK blocks Misbehavior 3: We observed that some TCP flows report SACK information incompletely once the missing data between two SACK blocks (say A l -A r and B l -B r ) are received. The next SACK should report a single SACK block combining the first SACK block (A l -A r ), the missing data in between, and the second SACK block (B l -B r ). Instead some implementations generate a SACK covering only the first SACK block and the missing data, i.e., (A l -B l ) skipping the second SACK block. The SACK implies that the second SACK block is reneged. Test C, described below and pictured in Fig. 3, tests this misbehavior 3. The data receiver should report one SACK block covering the two SACK blocks and the data in between. Test C 5. TBIT skips sending 2 nd data packet (402) to create a gap at the TCP IUT, and sends 3 rd data packet (403) 7. TBIT skips sending 4 th data packet (404) to create a second gap at the TCP IUT, and sends 5 th data packet (405) 9. TBIT sends 4 th data packet (404) to fill the missing data between the first and the second SACK blocks 10. TCP IUT acknowledges out-of-order data with SACK 11. TBIT sends three reset (RST) segments to abort the A proper SACK implementation is expected to report the out-of-order data ( ) in the last SACK as highlighted in the Fig. 3. A misbehaving SACK implementation would report the SACK block partially ( ). D. Failure to report SACKs during bidirectional data flow Misbehavior 4: This odd behavior happens when the data flow is bidirectional. In some TCP flows, SACK information is not conveyed when the TCP segment carries data. If a TCP host is sending data continuously (e.g., an HTTP server), only one SACK is sent when out-of-order data are received, and SACK information is not piggybacked with the following data segments. This behavior can cause less efficient SACK-based loss recovery since SACKs are sent only one time for each outof-order data arrival. Test D verifies the proper SACK generation in this situation (misbehavior 4). As stated in Section IIB, a conformant data receiver should include SACK information with all ACKs. If ACKs are piggybacked while sending data, SACKs also should be included in the TCP segment. We added a new TBIT test for misbehavior 4. To have bidirectional data flow and out-of-order data simultaneously, we used HTTP/1.1 GET requests [13]. HTTP/1.1 permits a persistent between TBIT and a TCP IUT. TBIT requests the file index.pdf (11650 bytes) which is large enough to have a data transfer requiring several round trips so that SACK information can be observed in the data segments. Test D 3. TBIT sends 1 st data packet ( : GET /index.pdf HTTP/1.1 request) in order 4. TCP IUT acknowledges the in order data with ACK (450) 5. TCP IUT starts sending segments of index.pdf 6. TBIT skips sending 2 nd data packet (450) to create a gap at the TCP IUT, sends 3 rd data packet (451) 7. TBIT acknowledges data segments of the TCP IUT 9. TCP IUT continues sending segments of index.pdf with SACK 10. Once index.pdf is retrieved, TBIT sends three reset (RST) segments to abort the persistent

4 versions of OpenBSD report at most three SACK blocks (Misbehavior 1a). Windows 2000, XP and Server 2003 report at most two SACK blocks (Misbehavior 1b). Figure 4. Failure to report SACKs during bidirectional data flow A conformant SACK implementation appends SACK information in data segments as shown in Fig. 4. A misbehaving implementation would not. III. EXPERIMENTAL DESIGN The TBIT tests described in Section II were performed over a local area network where the loss rate was controlled (no loss is introduced). Tests were performed between two machines, A and B, as shown in Fig. 5. The round trip time was on average 10ms, and no other background traffic was present. TBIT 1.0 [12] was extended on FreeBSD 7.1 (machine A) with four TBIT tests detailed in the previous section. Support to view SACK information of incoming TCP packets was also added for the debug output mode. Packet dump utilities such as tcpdump [14] or wireshark [15] could not be run simultaneously with TBIT because of file access rights conflict with TBIT. The added support ensured that all the packets sent by TCP IUT were received by TBIT. The verified IUTs were the standard TCP stacks of various operating systems. We installed twenty five operating systems, reported in Section IV, using the Oracle s VirtualBox virtualization software [16] on machine B. We ran the tests for Mac OS X on different machines. For each operating system, we installed an Apache HTTP Server [17] on machine B since TBIT is originally designed to infer TCP behavior of a web server. The TCP packets transmitted between TBIT and each TCP IUT are captured at machine B due to the above restriction. For this purpose, we also installed wireshark on each Windows operating systems, and tcpdump on each UNIX or UNIX-like operating system IUT. IV. RESULTS We verified the operating systems in Table I. Each TBIT test was repeated three times on different dates. In every case, all three test outputs were consistent. Packet captures of tests can be downloaded [18]. For test A, fewer than maximum number of reported SACK blocks, the early versions of FreeBSD, 5.3 and 5.4, and all Figure 5. Experimental design If the return path carrying SACKs were lossless, a TCP data receiver reporting at most two or three SACK blocks would not cause a problem. A data sender would always infer the proper state of the receive buffer for efficient SACK-based loss recovery described in RFC 3517 [6]. When more than four SACK blocks exist at a data receiver, and SACK segments are lost, the chance of a data sender getting less accurate state of the receive buffer increases as SACK implementations number of blocks reported is decreased. This misbehavior then can lead to less efficient SACK-based loss recovery, and therefore decreased throughput (longer transfer times) when multiple TCP segments are lost from the same window. TABLE I. Operating System RESULTS FOR TBIT TESTS Test A B C D FreeBSD 5.3, 5.4 1a FreeBSD 6.0, 7.3, Linux (Debian 3) Linux (Red Hat 8) Linux (Fedora 1) Linux (Ubuntu 5.10) Linux (Ubuntu 6.06) Linux (Debian 4) Linux (Ubuntu 9.10) Mac OS X 10.5, OpenBSD 4.2, 4.5, 4.6, 4.7 1a OpenSolaris , Solaris Windows 2000, XP, Server b Windows Vista, Server 2008,

5 We report, for the test B, that Microsoft s Windows 2000, XP and Server 2003, are misbehaving. SACK information is not reported, where it should be, after the cumulative ACK is increased beyond the first SACK block. The least harmful misbehavior, misbehavior 3, is observed with Microsoft s Windows 2000, XP and Server SACK information is partially reported when the data between two previously reported SACK blocks are received. In conclusion, SACK based loss recovery would be less efficient for only the non-reported out-of-order data. The last misbehavior, misbehavior 4, is observed with all the versions of Microsoft s Windows operating systems. When the TCP traffic is bidirectional, SACKs are not carried within the opposite direction TCP data segments. Out-of-order data are SACKed only when they arrive. If a SACK is lost on the return path, subsequent data packets with no SACKs will trigger a fast retransmission which can cause the data sender to spuriously retransmit. The success of the SACK-based loss recovery algorithm is proportional to the SACK information received from the data receiver. More SACK information results in a more accurate data sender. Misbehavior 4 leads to a less efficient SACK-based loss recovery. The traffic pattern described in misbehavior 4 is a typical web browsing scenario. TBIT represents a user s web browser where HTTP 1.1 GET requests are pipelined, and the TCP IUT represents an HTTP 1.1 web server. Since the scenario represents typical Internet traffic, we believe that the SACK generation misbehavior of the Windows systems should be fixed. V. ADDITIONAL MISBEHAVIORS During the course of verifying SACK generation behavior using TBIT, we discovered two additional misbehaviors. A. SACK problem in Solaris TCP stack When verifying Solaris/OpenSolaris, we ran the previously discussed TBIT tests successively. TBIT tests A, B, C and D were run consecutively on different port numbers. We observed that SACK information of a prior, say from Test A, would appear in the SYN-ACK packet of a new, say from Test B! To further investigate the misbehaving SACK behavior in Solaris, we developed TBIT test E as shown in the Fig. 6, this test using the same initial sequence numbers for consecutive s: Test E on the ephemeral port Eph 1 on port TBIT skips sending 2 nd data packet (402) to create a gap at the TCP IUT, and sends 3 rd data packet (403) 7. TBIT sends three reset (RST) segments to abort the 8. After X minutes, TBIT establishes a to the TCP IUT with on the ephemeral port Eph 2 9. TCP IUT replies with SACK-Permitted option on port 80 including a SACK block of the previous In the second, TCP IUT sends an acknowledgement with SACK block which is from the first. The machine running TBIT assumes data with sequence number 403 is SACKed but the TCP IUT never received the data. According to RFC 2018, eventually the sender will timeout on data 403, turn off all of the SACKed bits and retransmit the data, thus getting back to the correct behavior. However for a brief period of time, the data sender and receiver are in an inconsistent state. We ran the Test E multiple times on Solaris 10 and OpenSolaris with different time intervals X = {1, 5, 15} minutes. We frequently observed the reappearance of SACK blocks from a prior in later s. When the initial sequence number spaces of two consecutive s overlap, the observed misbehavior could cause a SACK-based loss recovery based on incorrect SACK information. That would be cause a decrease in throughput since the data reported (will be recovered by a timeout) to be in the receive buffer is actually not there. One time, we ran all the four TBIT tests explained in Section II continuously and noticed a scenario where a SACK block of the first in Test A appeared in the SYN- ACK packet of the third established in Test C. One time, all four TBIT tests were executed and then repeated 45 minutes later. Even after 45 minutes, we observed an instance where the SACK block of Test D from the first set appeared in the SYN-ACK packet of Test D in the second set. We could not repeat this misbehavior with any regularity. Having a sender think data is acknowledged when in fact the data has not been received results in an inconsistent (i.e., unreliable) state. Figure 6. SACK related misbehavior in Solaris TCP

6 B. SACK related problem in Linux TCP stack A second SACK-related misbehavior is observed during Test D on OpenSolaris and Linux systems (except Linux (Ubuntu 9.10)). We explain the misbehavior using Fig. 7 that shows a smaller portion of the test D in detail. 3. TBIT sends 1 st data packet ( : GET /index.pdf HTTP/1.1 request) in order 4. TCP IUT acknowledges the in order data with ACK (450) 5. TCP IUT sends the 1 st data segment of index.pdf 6. TCP IUT sends the 2 nd data segment of index.pdf 7. When 1 st data segment from TCP IUT is received, TBIT skips sending 2 nd data packet (450) to create a gap at the TCP IUT, and sends 3 rd data packet (451) 8. TBIT acknowledges the 1 st data segment of the TCP IUT 9. TCP IUT acknowledges out-of-order data (451) with a SACK 10. When the acknowledgement for 1 st data packet of TCP IUT is received, TCP IUT s congestion window (cwnd) is increased and enables sending two new data packets. TCP IUT sends two data packets: 3 rd packet (1448 bytes) and 4 th packet (12 bytes) 11. TBIT acknowledges the 2 nd data segment of the TCP IUT 12. When the acknowledgement for 2 nd data packet of TCP IUT is received, TCP IUT s congestion window enables sending two more data packets. TCP IUT sends two data packets: 5 th packet (1448 bytes) and 6 th packet (12 bytes) Figure 7. SACK related misbehavior in Linux TCP TCP implementations of Linux and OpenSolaris misbehave when a data receiver has its own data to send along with its SACK information. When an acknowledgement is received from TBIT, the TCP IUT s cwnd is increased to send two new data segments. The TCP IUT sends two data segments each with 1448 and 12 bytes of data. Both data segments from TCP IUT also include a SACK block (12 bytes). A proper SACK implementation is expected to send two data segments each with 1448 bytes of data and 12 bytes of SACK information. In the observed misbehavior, the second data segment carries only 12 bytes of data thus decreasing throughput. The misbehavior is observed continuously when there is out-of-order data in the receive buffer of the TPC IUT. Throughput is decreased almost by half for the time period out-of-order data exists in the receive buffer. We believe that the misbehavior is caused by appending SACK information (12 bytes). With no SACKs, each data segment carries 1460 bytes of data. When a SACK option is appended, 1460 bytes of data are split to two data segments each with 1448 and 12 bytes of data. Note that the second segment carries bytes equal to bytes required for a SACK block. To investigate the misbehavior further, we extended test D to create two, three and four blocks of out-of-order data at the TCP IUT. In these cases, the TCP IUT sends two data segments with (1440, 20), (1432, 28), (1424, 36) bytes, respectively. Note that the second data segment always carries bytes equal to bytes needed for SACK blocks appended. The throughput is again roughly halved for time period there are out-of-order data in the TCP IUT s receive buffer. The scenario presented is a typical web browsing scenario and the observed misbehavior reduces the overall throughput. We consider the misbehavior is critical and needs to be fixed. VI. RELATED WORK Two methodologies are mainly used to infer the TCP behavior: passive and active measurements. In passive measurements, collected trace files are analyzed offline to infer a specific protocol behavior. Paxson [19] presents tcpanaly, a tool which automatically analyses the correctness of TCP implementations by inspecting traces collected for bulk data transfers. The study s main interest is on congestion window evolution and proper ACK generation. With tcpanaly, non-conformant TCP stacks are identified and reported to the stack implementors. In [7], the authors describe the active measurement tool TBIT and its architecture. TBIT is used to infer the TCP behavior of remote web servers. A number of TBIT tests are provided by authors including testing a remote web server s support for SACK and testing if SACKs are correctly used by the web server to send proper segments during the SACKbased loss recovery. Ladha [20] is another active measurement in which the authors measure the deployment status of recent TCP enhancements using the TBIT at the time. The authors add three new TBIT tests for TCP extensions: limited transmit, appropriate byte counting (ABC), and early retransmit. In addition to the new test cases added, the SACK and initial congestion window tests of [7] are rerun to evaluate the deployment status of the extensions. In [8], the authors investigate the correctness of modern TCP implementations through active measurements. The active measurements are performed with TBIT. The work compares the correct use of SACK information by web servers. In 2005, correct use is increased to 90% as opposed to 2001 s 42% [7]. A new test is introduced to test if the web servers correctly generate SACK blocks, and ~91% of the web servers tested generate correct SACK blocks. Our research combines both methodologies. We use TBIT to create synthetic TCP traffic to validate the proper SACK

7 generation of TCP stacks. In addition, we capture TCP segments using a packet capture utility such as tcpdump or wireshark for offline SACK generation analysis. One approach that we could employ was to use a TCP stack instead of TBIT along with the dummynet [21] traffic shaper to drop specific packets to mimic the observed traffic patterns of observed misbehaviors. The traffic between TCP IUT and TCP stack could be captured with tcpdump/wireshark for later analysis. One problem with this approach is as follows. Since a TCP stack is used to test the proper SACK generation of a TCP IUT, the initial sequence number space of each would change with each test. In that case, analysis of SACK generation would be more complex. With TBIT, the sequence number space is controllable. Another approach would be to run TBIT tests on remote web servers and infer the operating system of web servers with a tool such as Network Mapper (NMAP) [22]. This approach has also several disadvantages. First, TBIT is not robust against packet loss and reordering. The tests need to be terminated once one of the two events is detected. Second, detecting the exact operating system of a remote web server is not always possible. NMAP did not return operating systems guesses for all remote web servers when we used the tool on ALEXA s [23] top twenty sites. Third, some of the remote web servers could employ TCP options such as timestamps which would cause having different results for the same operating system. Instead, we test SACK generation on standard TCP stacks of the reported operating systems with default settings. VII. CONCLUSION In this paper, we verify the conformant SACK generation on TCP stacks for a wide range of operating systems based on observed misbehaviors regarding to SACK generation in our data reneging investigations. We identified the characteristics of the four observed misbehaviors and designed with four new TBIT tests to uncover these misbehaviors. We verified the SACK generation on various number of FreeBSD, OpenBSD, Mac OS X, Linux, Solaris and Windows TCP stacks. For the four misbehaviors observed in the trace files, we found at least one misbehaving TCP stack. We report various versions of OpenBSD and Windows operating systems to have misbehaving SACK generation implementations. In general, the misbehaving SACK implementations can cause a less efficient SACK-based loss recovery which yields to decreased throughput (longer transfer times). During the TBIT tests, we identified two additional SACKrelated misbehaviors. The first misbehavior is serious and can cause a TCP to be inconsistent that is the data sender receives a SACK for data that was never received. Solaris and OpenSolaris systems misbehave in this manner. The second misbehavior decreases the throughput by sending less than expected data while using SACKs. Most Linux systems show this misbehavior. In this paper, we show that plenty of operating systems do not implement SACKs correctly which is simple in concept. We report the misbehaving stacks and provide capture files of the TBIT tests to the stack implementors. We hope that our work will help the TCP stack implementors to fix the incorrect implementations. ACKNOWLEDGMENTS The authors would like to thank Jonathan Leighton, Aasheesh Kolli and Ersin Ozkan for the valuable discussions and comments while developing this paper. REFERENCES [1] M. Mathis, J. Mahdavi, S. Floyd, A. Romanow, TCP Selective Acknowledgment Options, RFC 2018, October [2] J. Postel, Transmission Control Protocol, RFC 793, September [3] K. Fall, S. Floyd, Simulation-based comparisons of Tahoe, Reno, and SACK TCP, ACM Computer Communication Review, vol. 26, no. 3, July 1996, pp [4] R. Bruyeron, B. Hemon, L. Zhang, Experimentations with TCP selective acknowledgement, ACM Computer Communication Review, vol. 28, no. 2, April 1998, pp [5] M. Allman, C. Hayes, H. Kruse, S. Ostermann, "TCP performance over satellite links", Proceedings of the Fifth International Conference on Telecommunications Systems, March, [6] E. Blanton, M. Allman, K. Fall, L. Wang, A Conservative Selective Acknowledgment (SACK)-based Loss Recovery Algorithm for TCP, RFC 3517, April [7] J. Padhye, S. Floyd, On inferring TCP behavior, ACM SIGCOMM, August 2001, pp [8] A. Medina, M. Allman, S. Floyd, Measuring the evolution of transport protocols in the internet, ACM SIGCOMM Computer Communication Review, April [9] R. Stewart, Stream Control Transmission Protocol, RFC 4960, September [10] N. Ekiz, Transport layer reneging, PhD Dissertation, CISC Dept., Univ of Delaware (in progress). [11] CAIDA Internet Data Passive Data Sources, [12] The TCP Behavior Inference Tool, [13] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, Hypertext Transfer Protocol -- HTTP/1.1, RFC 2616, June [14] Tcpdump, [15] Wireshark, [16] VirtualBox, [17] Apache HTTP Server, [18] Packet captures of the TBIT tests, [19] V. Paxson, Automated packet trace analysis of TCP implementations, ACM SIGCOMM, September 1997 [20] S. Ladha, P. D. Amer, A. J. Caro, J. R. Iyengar, On the prevalence and evaluation of recent TCP enhancements, IEEE Globecom, November 2004 [21] L. Rizzo, "Dummynet: A simple approach to the evaluation of network protocols," ACM Computer Comm Review, 27(1):31-41, Jan [22] Network Mapper, [23] Global Top 500 Web Sites,

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

On Inferring TCP Behavior

On Inferring TCP Behavior On Inferring TCP Behavior Jitendra Padhye and Sally Floyd ATT Center for Internet Research at ICSI (ACIRI) padhye@aciri.org, floyd@aciri.org ABSTRACT Most of the traffic in today s Internet is controlled

More information

Measuring the Evolution of Transport Protocols in the Internet. Alberto Medina Mark Allman Sally Floyd

Measuring the Evolution of Transport Protocols in the Internet. Alberto Medina Mark Allman Sally Floyd Measuring the Evolution of Transport Protocols in the Internet Alberto Medina Mark Allman Sally Floyd 1 2 The Internet Protocol Stack Application Presentation Session Transport IP Data link Physical Internet

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc.

The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc. The Effect of Packet Reordering in a Backbone Link on Application Throughput Michael Laor and Lior Gendel, Cisco Systems, Inc. Abstract Packet reordering in the Internet is a well-known phenomenon. As

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Performance Comparison of SCTP and TCP over Linux Platform

Performance Comparison of SCTP and TCP over Linux Platform Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr

More information

High-Speed TCP Performance Characterization under Various Operating Systems

High-Speed TCP Performance Characterization under Various Operating Systems High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

TCP/IP Over Lossy Links - TCP SACK without Congestion Control Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

A Study of Internet Packet Reordering

A Study of Internet Packet Reordering A Study of Internet Packet Reordering Yi Wang 1, Guohan Lu 2, Xing Li 3 1 Department of Electronic Engineering Tsinghua University, Beijing, P. R. China, 100084 wangyi@ns.6test.edu.cn 2 China Education

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC

More information

Host Fingerprinting and Firewalking With hping

Host Fingerprinting and Firewalking With hping Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: 1608@nu.edu.pk Naveedafzal gmail.com Abstract: The purpose

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham RESO-LIP/INRIA Université Lyon 1 http://www.ens-lyon.fr/~cpham Basé sur les transparent de Shivkumar Kalyanaraman La couche transport dans

More information

Syslog Performance: Data Modeling and Transport

Syslog Performance: Data Modeling and Transport Syslog Performance: Data Modeling and Transport Mohammad Rajiullah, Reine Lundin, Anna Brunstrom, and Stefan Lindskog Department of Computer Science, Karlstad University SE-65 88 Karlstad, Sweden Email:

More information

Project 4: (E)DoS Attacks

Project 4: (E)DoS Attacks Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

Chapter 5. Transport layer protocols

Chapter 5. Transport layer protocols Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

1 An application in BPC: a Web-Server

1 An application in BPC: a Web-Server 1 An application in BPC: a Web-Server We briefly describe our web-server case-study, dwelling in particular on some of the more advanced features of the BPC framework, such as timeouts, parametrized events,

More information

High Speed Internet Access Using Satellite-Based DVB Networks

High Speed Internet Access Using Satellite-Based DVB Networks High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,

More information

TCP over Wireless Networks

TCP over Wireless Networks TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

1 Analysis of HTTPè1.1 Performance on a Wireless Network Stephen Cheng Kevin Lai Mary Baker fstephenc, laik, mgbakerg@cs.stanford.edu http:èèmosquitonet.stanford.edu Techical Report: CSL-TR-99-778 February

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM Computer Modelling & New Technologies, 2002, Volume 6, No.1, 62-68 Transport and Telecommunication Institute, Lomonosov Str.1, Riga, LV-1019, Latvia STATISTICS AND RELIABILITY PRODUCTIVITY ESTIMATION OF

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

TCP Fast Recovery Strategies: Analysis and Improvements

TCP Fast Recovery Strategies: Analysis and Improvements To appear in INFOCOM 98 TCP Fast Recovery Strategies: Analysis and Improvements Dong Lin and H.T. Kung Division of Engineering and Applied Sciences Harvard University Cambridge, MA 02138 USA Abstract This

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Solving complex performance problems in TCP/IP and SNA environments.

Solving complex performance problems in TCP/IP and SNA environments. IBM Global Services Solving complex performance problems in TCP/IP and SNA environments. Key Topics Discusses how performance analysis of networks relates to key issues in today's business environment

More information

Network Friendliness of Mobility Management Protocols

Network Friendliness of Mobility Management Protocols Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK

More information

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).

This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

How To Identify Different Operating Systems From A Set Of Network Flows

How To Identify Different Operating Systems From A Set Of Network Flows Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands s.mossel@gmx.net ABSTRACT` Network flow monitoring is a way of monitoring

More information

The Fundamentals of Intrusion Prevention System Testing

The Fundamentals of Intrusion Prevention System Testing The Fundamentals of Intrusion Prevention System Testing New network-based Intrusion Prevention Systems (IPS) complement traditional security products to provide enterprises with unparalleled protection

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network V. Anil Kumar 1 and Dorgham Sisalem 2 (anil@cmmacs.ernet.in, sisalem@fokus.fhg.de) 1 CSIR Centre

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Improving the Performance of HTTP over High Bandwidth-Delay Product circuits

Improving the Performance of HTTP over High Bandwidth-Delay Product circuits Improving the Performance of HTTP over High Bandwidth-Delay Product circuits A.J. McGregor National Laboratory for Applied Network Research San Diego Super Computer Center 10100 Hopkins Drive, San Diego,

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford

Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this

More information

Energy Consumption of TCP Reno, Newreno, and SACK in Multi-Hop Wireless Networks

Energy Consumption of TCP Reno, Newreno, and SACK in Multi-Hop Wireless Networks Energy Consumption of TCP Reno, Newreno, and SACK in Multi-Hop Wireless Networks Harkirat Singh Department of Computer Science Portland State University Portland, OR 977 harkirat@cs.pdx.edu Suresh Singh

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Computer Networks UDP and TCP

Computer Networks UDP and TCP Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing

More information

TRANSPORT LAYER LOAD BALANCING IN FCS NETWORKS

TRANSPORT LAYER LOAD BALANCING IN FCS NETWORKS RANSPOR LAYER LOAD BALANCING IN FCS NEWORKS Janardhan R. Iyengar, Paul D. Amer, Armando L. Caro, Jr. Protocol Engineering Lab Computer and Information Sciences University of Delaware iyengar, amer, acaro

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill david.idol@unc.edu http://www.cs.unc.edu/~mxrider

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data Pig Laboratory This laboratory is dedicated to Hadoop Pig and consists of a series of exercises: some of them somewhat mimic those in the MapReduce laboratory, others are inspired by "real-world" problems.

More information

Linux TCP Implementation Issues in High-Speed Networks

Linux TCP Implementation Issues in High-Speed Networks Linux TCP Implementation Issues in High-Speed Networks D.J.Leith Hamilton Institute, Ireland www.hamilton.ie 1. Implementation Issues 1.1. SACK algorithm inefficient Packets in flight and not yet acknowledged

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements

NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements Charles Robert Simpson, Jr. and George F. Riley Georgia Institute of Technology (Georgia Tech), Atlanta Georgia,

More information

Improving Internet Video Streaming Performance by Parallel TCP-based Request-Response Streams

Improving Internet Video Streaming Performance by Parallel TCP-based Request-Response Streams Improving Internet Video Streaming Performance by Parallel TCP-based Request-Response Streams Robert Kuschnig, Ingo Kofler, Hermann Hellwagner Institute of Information Technology ITEC), Klagenfurt University,

More information

TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid. network.

TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid. network. TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid networks Michael Crosnier, Riadh Dhaou, Fabrice Planchou and Andre-Luc Beylot Astrium, 31 avenue des cosmonautes,

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Sample Network Analysis Report

Sample Network Analysis Report Sample Network Analysis Report Report Information Report created on 1/9/2014 9:35:19 PM. Analyst Information Name Sample Analysis Report E-mail Address info@chappellu.com Phone Number 408-378-7841 Client

More information

Advanced Computer Networks Project 2: File Transfer Application

Advanced Computer Networks Project 2: File Transfer Application 1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application

More information

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Network Probe. Figure 1.1 Cacti Utilization Graph

Network Probe. Figure 1.1 Cacti Utilization Graph Network Probe Description The MCNC Client Network Engineering group will install several open source network performance management tools on a computer provided by the LEA or charter school to build a

More information

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of

More information

EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY

EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

An Improved TCP Congestion Control Algorithm for Wireless Networks

An Improved TCP Congestion Control Algorithm for Wireless Networks An Improved TCP Congestion Control Algorithm for Wireless Networks Ahmed Khurshid Department of Computer Science University of Illinois at Urbana-Champaign Illinois, USA khurshi1@illinois.edu Md. Humayun

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Improved Multiple File Transfer Protocol using Extended features of SCTP

Improved Multiple File Transfer Protocol using Extended features of SCTP Vol.2, Issue.3, May-June 2012 pp-1034-1038 ISSN: 2249-6645 Improved Multiple File Transfer Protocol using Extended features of SCTP Prabhanshu Jaiswal 1,Gaurav Agrawal 2,Pushpendra Singh 3, Dr. A.K. Sharma

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

Java Secure Application Manager

Java Secure Application Manager Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP

WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP Alae Loukili, Alexander Wijesinha, Ramesh K. Karne, and Anthony K. Tsetse Towson University Department of Computer & Information Sciences Towson, MD 21252

More information

Life of a Packet CS 640, 2015-01-22

Life of a Packet CS 640, 2015-01-22 Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have

More information